GHSA-gjjr-63x4-v8cq

Suggest an improvement
Source
https://github.com/advisories/GHSA-gjjr-63x4-v8cq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-gjjr-63x4-v8cq/GHSA-gjjr-63x4-v8cq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gjjr-63x4-v8cq
Aliases
Published
2023-10-09T21:30:27Z
Modified
2024-02-26T20:01:00.312124Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
langchain_experimental vulnerable to arbitrary code execution via PALChain in the python exec method
Details

langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via the PALChain in the python exec method.

References

Affected packages

PyPI / langchain-experimental

Package

Name
langchain-experimental
View open source insights on deps.dev
Purl
pkg:pypi/langchain-experimental

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.0.14

Affected versions

0.*

0.0.1rc1
0.0.1rc2
0.0.1rc3
0.0.1rc4
0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.11
0.0.12
0.0.13
0.0.14